Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 248

Full-Text Articles in Law

National Cybersecurity Innovation, Tabrez Y. Ebrahim Jan 2020

National Cybersecurity Innovation, Tabrez Y. Ebrahim

Faculty Scholarship

National cybersecurity plays a crucial role in protecting our critical infrastructure, such as telecommunication networks, the electricity grid, and even financial transactions. Most discussions about promoting national cybersecurity focus on governance structures, international relations, and political science. In contrast, this Article proposes a different agenda and one that promotes the use of innovation mechanisms for technological advancement. By promoting inducements for technological developments, such innovation mechanisms encourage the advancement of national cybersecurity solutions. In exploring possible solutions, this Article asks whether the government or markets can provide national cybersecurity innovation. This inquiry is a fragment of a much larger literature …


Cyber Mobs, Disinformation, And Death Videos: The Internet As It Is (And As It Should Be), Danielle K. Citron Jan 2020

Cyber Mobs, Disinformation, And Death Videos: The Internet As It Is (And As It Should Be), Danielle K. Citron

Faculty Scholarship

Fiction and visual representations can alter our understanding of human experiences and struggles. They help us understand human frailties and suffering in a visceral way. Nick Drnaso’s graphic novel Sabrina does that in spades. In Sabrina, a woman is murdered by a misogynist, and a video of her execution is leaked. Conspiracy theorists deem her murder a hoax. A cyber mob smears the woman’s loved ones as crisis actors, posts death threats, and spreads their personal information. The attacks continue until a shooting massacre redirects the cyber mob’s wrath to other mourners. Sabrina captures the breathtaking velocity of disinformation online …


Nascent Competitors, C. Scott Hemphill, Tim Wu Jan 2020

Nascent Competitors, C. Scott Hemphill, Tim Wu

Faculty Scholarship

A nascent competitor is a firm whose prospective innovation represents a serious threat to an incumbent. Protecting such competition is a critical mission for antitrust law, given the outsized role of unproven outsiders as innovators and the uniquely potent threat they often pose to powerful entrenched firms. In this Article, we identify nascent competition as a distinct analytical category and outline a program of antitrust enforcement to protect it. We make the case for enforcement even where the ultimate competitive significance of the target is uncertain, and explain why a contrary view is mistaken as a matter of policy and …


The Promise And Limits Of Cyber Power In International Law: Remarks, Monica Hakimi, Ann Väljataga, Zhixiong Huang, Charles Allen, Sue Robertson, Doug Wilson Jan 2020

The Promise And Limits Of Cyber Power In International Law: Remarks, Monica Hakimi, Ann Väljataga, Zhixiong Huang, Charles Allen, Sue Robertson, Doug Wilson

Faculty Scholarship

Hi, everyone. I am Monica Hakimi from the University of Michigan Law School, and I would like to welcome you to our panel on cyber power and its limits. The topic almost does not need an introduction. We all know just from reading the news that our collective dependence on cyberspace is also a huge vulnerability, and state and non-state actors exploit this vulnerability to do one another harm. They use cyber technologies not just to spy on one another, but also, for example, to interfere in national elections, to steal trade secrets or other valuable information, to disrupt the …


Cyberattacks And The Constitution, Matthew C. Waxman Jan 2020

Cyberattacks And The Constitution, Matthew C. Waxman

Faculty Scholarship

Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.


Transparency After Carpenter, Hannah Bloch-Wehba Jan 2020

Transparency After Carpenter, Hannah Bloch-Wehba

Faculty Scholarship

This brief invited response to Professor Matthew Tokson’s Foulston-Siefkin lecture on the Supreme Court's decision in Carpenter v. United States makes two contributions. First, I highlight the social, political, and economic factors at play in the Carpenter decision. The Carpenter Court recognized, in particular, that digital surveillance implicates the rights of more than just criminal suspects: it poses unique and unappreciated threats to public governance of policing. The decision, I argue, reflects longstanding preoccupations in Fourth Amendment decisions with protecting the “public” — particularly innocent third parties — from intrusive and baseless investigations. In so doing, I situate Professor Tokson’s …


A United States Perspective On Digital Single Market Directive Art. 17, Jane C. Ginsburg Jan 2020

A United States Perspective On Digital Single Market Directive Art. 17, Jane C. Ginsburg

Faculty Scholarship

To a US appraiser, article 17 of the Digital Single Market Directive suggests the EU has learned from American mistakes (and from its own) in the allocation of internet intermediaries’ liability for hosting and communicating user-posted content. Before the DSM Directive, art. 14 of the 2000 eCommerce Directive set out a notice-and-takedown system very similar to the regime provided in 17 U.S.C. section 512(c). Both regimes replaced the normal copyright default, which requires authorization to exploit works, with a limitation on the liability of service providers who complied with statutory prerequisites. Because the limitation ensured that service providers would not …


Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney Dec 2019

Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney

Faculty Scholarship

Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …


Online Legal Document Providers And The Public Interest: Using A Certification Approach To Balance Access To Justice And Public Protection, Susan Saab Fortney Oct 2019

Online Legal Document Providers And The Public Interest: Using A Certification Approach To Balance Access To Justice And Public Protection, Susan Saab Fortney

Faculty Scholarship

The Internet and electronic communications have revolutionized how consumers obtain legal information and assistance. The availability of legal forms and services has developed at lightning speed and countless consumers are using these forms, rather than consulting attorneys. At the same time, many regulators of the legal profession appear to be frozen in time. Some take the position that the provision of interactive forms amounts to the unauthorized practice of law and others question arrangements that appear to involve the sharing of legal fees with non-lawyers. Even for those interested in regulating the provision of on-line services, one complication to doing …


Sexual Privacy, Danielle K. Citron May 2019

Sexual Privacy, Danielle K. Citron

Faculty Scholarship

Those who wish to control, expose, and damage the identities of individuals routinely do so by invading their privacy. People are secretly recorded in bedrooms and public bathrooms and “up their skirts.” Such images are used to coerce people into sharing nude photographs and filming sex acts under the threat of public disclosure. People’s nude images are posted online without permission. Machine-learning technology is used to create digitally manipulated “deep fake” sex videos that swap people’s faces into pornography.

Each of these abuses is an invasion of sexual privacy—the behaviors, expectations, and choices that manage access to and information about …


When Law Frees Us To Speak, Danielle K. Citron, Jonathon Penney May 2019

When Law Frees Us To Speak, Danielle K. Citron, Jonathon Penney

Faculty Scholarship

A central aim of online abuse is to silence victims. That effort is as regrettable as it is successful. In the face of cyber harassment and sexual privacy invasions, women and marginalized groups retreat from online engagement. These documented chilling effects, however, are not inevitable. Beyond its deterrent function, law has an equally important expressive role. In this article, we highlight law’s capacity to shape social norms and behavior through education. We focus on a neglected dimension of law’s expressive role—its capacity to empower victims to express their truths and engage with others. Our argument is theoretical and empirical. We …


A Hater's Guide To Geoblocking, Peter K. Yu Mar 2019

A Hater's Guide To Geoblocking, Peter K. Yu

Faculty Scholarship

Geoblocking restricts access to online content based on the user's geographical location. Territorially based access control is strongly disliked, if not passionately hated, by those who travel abroad frequently as well as those who consume a considerable amount of foreign content. While the past has seen the use of geoblocking as technological self-help, such a technique has now received growing support from policymakers and judges.

Commissioned for a symposium on "Intellectual Property in a Globalized Economy: United States Extraterritoriality in International Business," this article begins by briefly recounting five sets of arguments against geoblocking. The article then draws on the …


Intermediaries And Private Speech Regulation: A Transatlantic Dialogue - Workshop Report, Tiffany Li Jan 2019

Intermediaries And Private Speech Regulation: A Transatlantic Dialogue - Workshop Report, Tiffany Li

Faculty Scholarship

The Wikimedia/Yale Law School Initiative on Intermediaries and Information (WIII) at Yale Law School has released a comprehensive report synthesizing key insights from intermediary liability and online speech and expression experts in Europe and the United States.

The report focuses on the critical but complicated issue of private speech regulation on the internet and the connections between platform liability laws and fundamental rights, including free expression. The report reflects discussions held at “Intermediaries & Private Speech Regulation: A Transatlantic Dialogue,” an invitation-only workshop convened by WIII, featuring leading internet law experts from the United States and Europe.

This report highlights …


Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley Jan 2019

Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley

Faculty Scholarship

Cybersecurity has become a significant concern in corporate and commercial settings, and for good reason: a threatened or realized cybersecurity breach can materially affect firm value for capital investors. This paper explores whether market arbitrageurs appear systematically to exploit advance knowledge of such vulnerabilities. We make use of a novel data set tracking cybersecurity breach announcements among public companies to study trading patterns in the derivatives market preceding the announcement of a breach. Using a matched sample of unaffected control firms, we find significant trading abnormalities for hacked targets, measured in terms of both open interest and volume. Our results …


The Good, The Bad, And The Ugly Of Online Reviews: The Trouble With Trolls And A Role For Contract Law After The Consumer Review Fairness Act, Wayne Barnes Jan 2019

The Good, The Bad, And The Ugly Of Online Reviews: The Trouble With Trolls And A Role For Contract Law After The Consumer Review Fairness Act, Wayne Barnes

Faculty Scholarship

The advent of the Internet has brought innumerable innovations to our lives. Among the innovations is the meteoric rise in the volume of e-commerce conducted on the Internet. Correspondingly, consumer-posted information about merchants, goods, and services has also begun to be a rich source of information for consumers researching a purchase online. This information takes many forms, but a major category is the narrative review describing the purchase and experience. Such reviews are posted on websites such as Yelp, Amazon and TripAdvisor, on apps, and on social media such as Facebook and Twitter. The amount and volume of reviews has …


Introduction To The Symposium On Cyber Attribution, Monica Hakimi Jan 2019

Introduction To The Symposium On Cyber Attribution, Monica Hakimi

Faculty Scholarship

This symposium explores some of the legal issues surrounding the attribution of cyber conduct to states. Relative to states’ other activities, cyber conduct poses particularly thorny attribution challenges. States that engage in such conduct often use technology to obscure their identities or the full effects of their operations. The attribution challenges in turn raise difficult questions about how victim states should be allowed to respond — whether in kind, with other retorsions or countermeasures, with kinetic force, or by doing nothing at all. For example, how confident must a victim state be that it has correctly identified the source of …


The Problem Isn't Just Backpage: Revising Section 230 Immunity, Danielle K. Citron, Benjamin Wittes Jul 2018

The Problem Isn't Just Backpage: Revising Section 230 Immunity, Danielle K. Citron, Benjamin Wittes

Faculty Scholarship

Backpage is a classifieds hub that hosts “80 percent of the online advertising for illegal commercial sex in the United States.” This is not by happenstance but rather by design. Evidence suggests that the advertising hub selectively removed postings discouraging sex trafficking. The site also tailored its rules to protect the practice from detection, including allowing anonymized email and photographs stripped of metadata. Under the prevailing interpretation of 47 U.S.C. § 230 (“Section 230”) of the CDA, however, Backpage would be immune from liability connected to sex trafficking even though it proactively helped sex traffickers from getting caught. No matter …


Consumer Bitcredit And Fintech Lending, Christopher K. Odinet May 2018

Consumer Bitcredit And Fintech Lending, Christopher K. Odinet

Faculty Scholarship

The digital economy is changing everything, including how we borrow money. In the wake of the 2008 crisis, banks pulled back in their lending and, as a result, many consumers and small businesses found themselves unable to access credit. A wave of online firms called fintech lenders have filled the space left vacant by traditional financial institutions. These platforms are fast making antiques out of many mainstream lending practices, such as long paper applications and face-to-face meetings. Instead, through underwriting by automation — utilizing big data (including social media data) and machine learning — loan processing that once took days …


Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg Apr 2018

Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg

Faculty Scholarship

To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …


Zappers, Phantomware And Other Sales Suppression Software In The State Of Washington, Richard Thompson Ainsworth, Robert Chicoine Mar 2018

Zappers, Phantomware And Other Sales Suppression Software In The State Of Washington, Richard Thompson Ainsworth, Robert Chicoine

Faculty Scholarship

Electronic sales suppression (ESS) is a fraud that has been a (prominent) feature of the North American retail business since at least 1996. The first EES case in the US dates from 1981. ESS is a global problem. Depending on the jurisdiction, and the research study consulted, ESS is estimated to be present in 34% (of Canadian), 50% (of German – two studies), and 70% (of Swedish and Slovenian) businesses. It may be the case today, that “you cannot leave home without” encountering (or participating in) ESS.

The most common types of sales suppression technology are Zappers and Phantomware programming. …


Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove Mar 2018

Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove

Faculty Scholarship

In lawsuits about data breaches, the issue of harm has confounded courts. Harm is central to whether plaintiffs have standing to sue in federal court and whether their claims are viable. Plaintiffs have argued that data breaches create a risk of future injury from identity theft or fraud and that breaches cause them to experience anxiety about this risk. Courts have been reaching wildly inconsistent conclusions on the issue of harm, with most courts dismissing data breach lawsuits for failure to allege harm. A sound and principled approach to harm has yet to emerge, resulting in a lack of consensus …


"Fake News," No News, And The Needs Of Local Communities, Carol Pauli Mar 2018

"Fake News," No News, And The Needs Of Local Communities, Carol Pauli

Faculty Scholarship

The Quaker authors had in mind an ancient truth - that "love endures and overcomes" - and they were convinced that this truth is accessible to all. This article addresses truth at a more immediate and mundane level. It is concerned with the accurate information that local communities need in order to thrive.

The article proceeds in three steps. Part I reviews one way community needs were addressed when the first large-scale electronic communication technology entered individual homes in the form of radio and television. In those days, broadcasters had an affirmative duty to ascertain the problems of the communities …


Exposing Secret Searches: A First Amendment Right Of Access To Electronic Surveillance Orders, Hannah Bloch-Wehba Mar 2018

Exposing Secret Searches: A First Amendment Right Of Access To Electronic Surveillance Orders, Hannah Bloch-Wehba

Faculty Scholarship

Although, as a rule, court proceedings and judicial records are presumptively open to the public, electronic surveillance documents are exceptions. Like ordinary search warrants, surveillance applications are considered ex parte. But court orders frequently remain sealed indefinitely, even when there is no basis for continued secrecy. Indeed, secrecy — in the form of gag orders, local judicial rules, and even clerical filing and docketing practices — is built into the laws that regulate electronic surveillance.

This Article argues that this widespread secrecy violates the First Amendment right of access to court proceedings and documents. The history of search and seizure …


Beyond Intermediary Liability: The Future Of Information Platforms - Workshop Report, Tiffany Li Feb 2018

Beyond Intermediary Liability: The Future Of Information Platforms - Workshop Report, Tiffany Li

Faculty Scholarship

On February 13, 2018, WIII hosted the workshop, “Beyond Intermediary Liability: The Future of Information Platforms.” Leading experts from industry, civil society, and academia convened at Yale Law School for a series of non-public, guided discussions. The roundtable of experts considered pressing questions related to intermediary liability and the rights, roles, and responsibilities of information platforms in society. Based on conversations from the workshop, WIII published a free, publicly available report detailing the most critical issues necessary for understanding the role of information platforms, such as Facebook and Google, in law and society today. The report highlights insights and questions …


Sexual Privacy, Danielle Keats Citron Jan 2018

Sexual Privacy, Danielle Keats Citron

Faculty Scholarship

Those who wish to control and expose the identities of women and people from marginalized communities routinely do so by invading their privacy. People are secretly recorded in bedrooms and public bathrooms, and “up their skirts.” They are coerced into sharing nude photographs and filming sex acts under the threat of public disclosure of their nude images. People’s nude images are posted online without permission. Machine-learning technology is used to create digitally manipulated “deep fake” sex videos that swap people’s faces into pornography.

At the heart of these abuses is an invasion of sexual privacy—the behaviors and expectations that manage …


Prediction, Persuasion, And The Jurisprudence Of Behaviorism, Frank A. Pasquale, Glyn Cashwell Jan 2018

Prediction, Persuasion, And The Jurisprudence Of Behaviorism, Frank A. Pasquale, Glyn Cashwell

Faculty Scholarship

No abstract provided.


Four Principles For Digital Expression (You Won't Believe #3!), Danielle K. Citron, Neil Richards Jan 2018

Four Principles For Digital Expression (You Won't Believe #3!), Danielle K. Citron, Neil Richards

Faculty Scholarship

At the dawn of the Internet’s emergence, the Supreme Court rhapsodized about its potential as a tool for free expression and political liberation. In ACLU v. Reno (1997), the Supreme Court adopted a bold vision of Internet expression to strike down a federal law - the Communications Decency Act - that restricted digital expression to forms that were merely “decent.” Far more than the printing press, the Court explained, the mid-90s Internet enabled anyone to become a town crier. Communication no longer required the permission of powerful entities. With a network connection, the powerless had as much luck reaching a …


Race And Rights In The Digital Age, Catherine Powell Jan 2018

Race And Rights In The Digital Age, Catherine Powell

Faculty Scholarship

No abstract provided.


Twenty Years Of Web Scraping And The Computer Fraud And Abuse Act, Andrew Sellars Jan 2018

Twenty Years Of Web Scraping And The Computer Fraud And Abuse Act, Andrew Sellars

Faculty Scholarship

"Web scraping" is a ubiquitous technique for extracting data from the World Wide Web, done through a computer script that will send tailored queries to websites to retrieve specific pieces of content. The technique has proliferated under the ever-expanding shadow of the Computer Fraud and Abuse Act (CFAA), which, among other things, prohibits obtaining information from a computer by accessing the computer without authorization or exceeding one's authorized access.

Unsurprisingly, many litigants have now turned to the CFAA in attempt to police against unwanted web scraping. Yet despite the rise in both web scraping and lawsuits about web scraping, practical …


Extremist Speech, Compelled Conformity, And Censorship Creep, Danielle K. Citron Jan 2018

Extremist Speech, Compelled Conformity, And Censorship Creep, Danielle K. Citron

Faculty Scholarship

Silicon Valley has long been viewed as a full-throated champion of First Amendment values. The dominant online platforms, however, have recently adopted speech policies and processes that depart from the U.S. model. In an agreement with the European Commission, tech companies have pledged to respond to reports of hate speech within twenty-four hours, a hasty process that may trade valuable expression for speedy results. Plans have been announced for an industry database that will allow the same companies to share hashed images of banned extremist content for review and removal elsewhere.

These changes are less the result of voluntary market …